Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Management Information Systems

Electronic Privacy: Patient Concerns, Anza A. Akram Jan 2015

Electronic Privacy: Patient Concerns, Anza A. Akram

Communications of the IIMA

This study postulates issues related to electronic privacy and addresses the factors that directly effect personal electronic information. There is no positivist study done to measure patient privacy concerns using Smith et a 1(1996) privacy model and the effect of previous experience and media on these concerns. This study measures the four dimensions of patient concerns against the electronic privacy, defines as the automation of patient records, meaning that computerized patient records will be signed, modified, authenticated, stored, and retrieved via computer. The defined model uses multiple constructs with multiple indicators and thus. Partial Least Square (PLS) is applied to …


Lying About Private Information: An Ethical Justification, Sabah S. Al-Fedaghi Jan 2015

Lying About Private Information: An Ethical Justification, Sabah S. Al-Fedaghi

Communications of the IIMA

Lying motivated by a fear of misusing private information is a key issue in ethics with many important applications in law, business, politics, and psychology. In this paper, lying is separated according to two types of assertions: lying about non-private information and lying about private information. This distinction is applied to the case of the 'known murderer' in the context of Kant's categorical imperative. The main result of the paper is narrowing the ethical dilemma to a choice between 'a zero private information society' and 'an alTlying-about-private-information society'. We claim that privacy as a universal requirement supports lying about private …


Cracking Down On Cybercrime Global Response: The Cybercrime Convention, Sylvia Mercado Kierkegaard Jan 2015

Cracking Down On Cybercrime Global Response: The Cybercrime Convention, Sylvia Mercado Kierkegaard

Communications of the IIMA

Computers and the Internet have brought innumerable benefits to society. They have revolutionized the way people work, play, and communicate. In spite of the benefits the Internet has introduced to the global community, it is also fraught with risks associated with undesirable elements keen to misuse its usage. Computers and the Internet present new ways to engage in old crimes, such as fraud and piracy. They also have made it possible for criminals to perpetrate new harmful acts, like data access and interference. However, national legislations and regional agreements are not sufficient to address the global nature of cybercrime. Therefore, …


Effects Of Exchange Benefits, Security Concerns And Situational Privacy Concerns On Mobile Commerce Adoption, Hua Dai, Yan Chen Jan 2015

Effects Of Exchange Benefits, Security Concerns And Situational Privacy Concerns On Mobile Commerce Adoption, Hua Dai, Yan Chen

Journal of International Technology and Information Management

Few empirical studies have examined both privacy and security concerns in the context of mobile commerce (m-commerce) while accounting for the effects of situational privacy concerns specific to the context of m-commerce. This research fills this gap in research by exploring users’ exchange perceptions specific to the context of m-commerce in China and by examining the inhibitors and drives of m-commerce adoption in China from the perspectives of social exchange. Particularly, this research develops an integrated research model in which users’ perceptions on value added of and usefulness of m-commerce, and users’ privacy concerns and security concerns of m- commerce …